Science of Security Virtual Organization |
|
Graduate Summer School: Games and Contracts for Cyber-Physical Security |
|
2015 HCSS Conference |
|
Multi-Language and Multi-Prover Verification with SAWScript |
|
Verifiable C: Proving Functional Correctness of C Programs in Coq, e.g. SHA-256 and HMAC |
|
Cerberus: Towards an Executable Semantics for Sequential and Concurrent C11 |
|
Proof Engineering: The Soft Side of Hard Proof |
|
Detecting Malice in Commodity Software |
|
Remote Attestation for Cloud-Based Systems |
|
Not-quite-so-broken TLS: Lessons in Re-engineering a Security Protocol Specification and Implementation |
|
Rigorous Architectural Modelling for Production Multiprocessors |
|
Language-based Hardware Verification with ReWire: Just Say No! to Semantic Archaeology |
|
Achieving High Speed and High Assurance in a Hardware-Based Cross-Domain System Using Guardol |
|
Bringing Hardware Hacking to Life |
|
Building Privacy-Aware Computing Systems: An Overview of Current Capabilities and Technical Challenges |
|
Reconciling Provable Security and Practical Cryptography: A Programming Language Perspective |
|
NSA Civil Liberties & Privacy: Bridging the Art and Science of Privacy |
|